Analysis

  • max time kernel
    135s
  • max time network
    200s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    28-12-2022 18:25

General

  • Target

    publish/share/icons/Adwaita/scalable/devices/phone-old-symbolic.xml

  • Size

    3KB

  • MD5

    c590272a42d82da3ba71308e7797f858

  • SHA1

    c26a5aefb08445bce6dae45f1ed08616ef4e3288

  • SHA256

    9c6eb1e6a94abdeccb4aa3573e11676bcb58b0e9eb63e6862b4fed9d1b375300

  • SHA512

    569061e43ac1ab1df720d6a5e50d016735bb203622188673f036359215de5fc0980aa62c3ba1888db443841c103f4c0a55a99294d57a4900b95f6111d9647288

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\publish\share\icons\Adwaita\scalable\devices\phone-old-symbolic.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\publish\share\icons\Adwaita\scalable\devices\phone-old-symbolic.xml
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3604
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3604 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4596

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    f7b6855beb7fde6cdb1a2a9ba9fa6bcd

    SHA1

    fd947696cabb78e309ad669dff0b980b17818567

    SHA256

    f1630debcf83e724c695443316dc8ad1abfb9d422e1450edbd3fc87b23f0649d

    SHA512

    e21c7570af2e3a77ce35f0f4ea4bef6b2a96bb7910a5c84eab60cba45a653b428c92def96f3d9bf393a156ccb901eb9f131eee2b71b91c20c38bf50b9ebe554e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    434B

    MD5

    d80a84806bd5d2064e1a7f656be085a0

    SHA1

    1fd04eca8477739fb1e688e4f8f0a9128327b992

    SHA256

    ccd62737b207ace84274bc6ffe5be650b77b509748b3416b64321db7ce9dfca4

    SHA512

    72b755054567dbcfe9164bbcf30c41089a566a90e0b56c7e836df84bc2f6c206c6fcb3eec0873342d01133b8dc595081da0f0f30d5a458698a09f8579114f386

  • memory/1304-132-0x00007FFA53090000-0x00007FFA530A0000-memory.dmp
    Filesize

    64KB

  • memory/1304-133-0x00007FFA53090000-0x00007FFA530A0000-memory.dmp
    Filesize

    64KB

  • memory/1304-134-0x00007FFA53090000-0x00007FFA530A0000-memory.dmp
    Filesize

    64KB

  • memory/1304-135-0x00007FFA53090000-0x00007FFA530A0000-memory.dmp
    Filesize

    64KB

  • memory/1304-136-0x00007FFA53090000-0x00007FFA530A0000-memory.dmp
    Filesize

    64KB

  • memory/1304-137-0x00007FFA53090000-0x00007FFA530A0000-memory.dmp
    Filesize

    64KB

  • memory/1304-138-0x00007FFA53090000-0x00007FFA530A0000-memory.dmp
    Filesize

    64KB

  • memory/1304-139-0x00007FFA53090000-0x00007FFA530A0000-memory.dmp
    Filesize

    64KB

  • memory/1304-140-0x00007FFA53090000-0x00007FFA530A0000-memory.dmp
    Filesize

    64KB